/linux-master/security/integrity/ima/ |
H A D | Makefile | 7 obj-$(CONFIG_IMA) += ima.o ima_iint.o 9 ima-y := ima_fs.o ima_queue.o ima_init.o ima_main.o ima_crypto.o ima_api.o \ 11 ima-$(CONFIG_IMA_APPRAISE) += ima_appraise.o 12 ima-$(CONFIG_IMA_APPRAISE_MODSIG) += ima_modsig.o 13 ima-$(CONFIG_HAVE_IMA_KEXEC) += ima_kexec.o 14 ima-$(CONFIG_IMA_BLACKLIST_KEYRING) += ima_mok.o 15 ima-$(CONFIG_IMA_MEASURE_ASYMMETRIC_KEYS) += ima_asymmetric_keys.o 16 ima-$(CONFIG_IMA_QUEUE_EARLY_BOOT_KEYS) += ima_queue_keys.o 19 ima-$(CONFIG_IMA_SECURE_AND_OR_TRUSTED_BOOT) += ima_efi.o
|
H A D | ima_asymmetric_keys.c | 14 #include <linux/ima.h> 15 #include "ima.h" 50 * (such as ".builtin_trusted_keys", ".ima", etc.) to
|
H A D | ima_efi.c | 7 #include <linux/ima.h> 19 pr_info("ima: secureboot mode unknown, no efi\n"); 25 pr_info("ima: secureboot mode disabled\n"); 27 pr_info("ima: secureboot mode unknown\n"); 29 pr_info("ima: secureboot mode enabled\n");
|
H A D | ima_init.c | 18 #include <linux/ima.h> 21 #include "ima.h"
|
H A D | ima_kexec.c | 14 #include <linux/ima.h> 15 #include "ima.h" 65 print_hex_dump_debug("ima dump: ", DUMP_PREFIX_NONE, 16, 1,
|
H A D | ima_main.c | 26 #include <linux/ima.h> 31 #include "ima.h" 352 /* read 'security.ima' */ 1200 .name = "ima", 1216 DEFINE_LSM(ima) = { variable 1217 .name = "ima",
|
H A D | ima_appraise.c | 14 #include <linux/ima.h> 20 #include "ima.h" 404 *cause = "unknown-ima-data"; 475 * Call evm_verifyxattr() to verify the integrity of 'security.ima'. 603 * ima_update_xattr - update 'security.ima' hash value 659 * ima_protect_xattr - protect 'security.ima' 661 * Ensure that not just anyone can modify or remove 'security.ima'. 719 /* success if the algorithm is allowed in the ima policy */
|
/linux-master/arch/s390/kernel/ |
H A D | ima_arch.c | 3 #include <linux/ima.h>
|
/linux-master/drivers/md/ |
H A D | dm-ima.c | 11 #include "dm-ima.h" 13 #include <linux/ima.h> 19 #define DM_MSG_PREFIX "ima" 167 * Initialize/reset the dm ima related data structure variables. 171 memset(&(md->ima), 0, sizeof(md->ima)); 172 md->ima.dm_version_str_len = strlen(DM_IMA_VERSION_STR); 229 memcpy(ima_buf + l, DM_IMA_VERSION_STR, table->md->ima.dm_version_str_len); 230 l += table->md->ima.dm_version_str_len; 286 memcpy(ima_buf + l, DM_IMA_VERSION_STR, table->md->ima [all...] |
H A D | dm-core.h | 22 #include "dm-ima.h" 147 struct dm_ima_measurements ima; member in struct:mapped_device
|
H A D | Makefile | 96 dm-mod-objs += dm-ima.o
|
/linux-master/arch/powerpc/kernel/ |
H A D | ima_arch.c | 7 #include <linux/ima.h> 46 * trusted boot. The "template=ima-modsig" option includes the appended 50 "measure func=KEXEC_KERNEL_CHECK template=ima-modsig", 51 "measure func=MODULE_CHECK template=ima-modsig",
|
/linux-master/security/integrity/ |
H A D | Makefile | 21 # The relative order of the 'ima' and 'evm' LSMs depends on the order below. 22 obj-$(CONFIG_IMA) += ima/
|
/linux-master/security/selinux/ |
H A D | Makefile | 25 selinux-$(CONFIG_IMA) += ima.o
|
H A D | ima.c | 11 #include <linux/ima.h> 13 #include "ima.h"
|
/linux-master/tools/testing/selftests/kexec/ |
H A D | test_kexec_file_load.sh | 5 # the IMA signature stored in the security.ima xattr or the PE signature, 85 line=$(getfattr -n security.ima -e hex --absolute-names $KERNEL_IMAGE 2>&1) 86 echo $line | grep -q "security.ima=0x03" 228 # Are there pe and ima signatures
|
H A D | kexec_common_lib.sh | 204 local ima_policy=$SECURITYFS/ima/policy
|
/linux-master/arch/x86/kernel/ |
H A D | kexec-bzimage64.c | 217 struct ima_setup_data *ima; local 223 sd->len = sizeof(*ima); 225 ima = (void *)sd + sizeof(struct setup_data); 226 ima->addr = image->ima_buffer_addr; 227 ima->size = image->ima_buffer_size;
|
H A D | setup.c | 14 #include <linux/ima.h>
|
/linux-master/security/integrity/platform_certs/ |
H A D | load_uefi.c | 10 #include <linux/ima.h>
|
/linux-master/drivers/misc/sgi-gru/ |
H A D | gru_instructions.h | 90 unsigned char ima: 3; /* CB_DelRep, unmapped mode */ member in struct:gru_instruction_bits 124 unsigned long op64; /* icmd,xtype,iaa0,ima,opc,tri0 */ 233 /* Instruction mode attributes (ima field) */ 305 unsigned long idef2, unsigned char ima) 312 (ima << GRU_CB_IMA_SHFT) | 616 unsigned int ima :3; member in struct:gru_control_block_status 303 __opdword(unsigned char opcode, unsigned char exopc, unsigned char xtype, unsigned char iaa0, unsigned char iaa1, unsigned long idef2, unsigned char ima) argument
|
/linux-master/tools/testing/selftests/bpf/prog_tests/ |
H A D | test_ima.c | 14 #include "ima.skel.h" 74 struct ima *skel = NULL; 137 * If commit 62622dab0a28 ("ima: return IMA digest value only when
|
/linux-master/drivers/of/ |
H A D | kexec.c | 12 #include <linux/ima.h> 135 prop = of_get_property(of_chosen, "linux,ima-kexec-buffer", &len); 143 /* Do some sanity on the returned size for the ima-kexec buffer */ 175 prop = of_find_property(of_chosen, "linux,ima-kexec-buffer", NULL); 211 prop = fdt_getprop(fdt, chosen_node, "linux,ima-kexec-buffer", &len); 216 fdt_delprop(fdt, chosen_node, "linux,ima-kexec-buffer"); 243 "linux,ima-kexec-buffer",
|
/linux-master/kernel/bpf/ |
H A D | bpf_lsm.c | 18 #include <linux/ima.h>
|
/linux-master/kernel/ |
H A D | kexec_file.c | 21 #include <linux/ima.h>
|